<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Authorization issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752754#M487968</link>
    <description>&lt;P&gt;We need to see radius live logs from ISE&lt;/P&gt;</description>
    <pubDate>Mon, 26 Nov 2018 13:48:52 GMT</pubDate>
    <dc:creator>ognyan.totev</dc:creator>
    <dc:date>2018-11-26T13:48:52Z</dc:date>
    <item>
      <title>Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3749703#M487963</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am working on Cisco ISE 2.2. The issue is that when I have connected multiple devices at through&amp;nbsp;HUB or desktop switch. The connected device got authentication through MAB, that's I need but the other connected device&amp;nbsp;should e authenticate with&amp;nbsp;dot1x&lt;/P&gt;
&lt;P&gt;But that device is kept requesting for the authentication multiple times so it quaring&amp;nbsp;multiple time and utilize more resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I check the logs from the switch side, I found the dot1.x failed logs and at the cisco ise&amp;nbsp;side, I can see the session but not the authentication pass.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not know, how can I solve this problem? Is there any suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also one more&amp;nbsp;question, I am trying&amp;nbsp;to deploy the multi-auth. configuration, can anyone provide me a guideline, how can I deploy it?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Nov 2018 05:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3749703#M487963</guid>
      <dc:creator>jm.virtual01</dc:creator>
      <dc:date>2018-11-20T05:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3749733#M487964</link>
      <description>&lt;P&gt;Hi , please share port config on switch side , to see what is configured and share authentication and authorization policy .&lt;/P&gt;
&lt;P&gt;I think you have misconfig&lt;/P&gt;</description>
      <pubDate>Tue, 20 Nov 2018 06:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3749733#M487964</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-11-20T06:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3750410#M487965</link>
      <description>&lt;P&gt;The configuration on the switch,&lt;/P&gt;
&lt;P&gt;interface gi yy&lt;BR /&gt; switchport access vlan xxx&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan yyy&lt;BR /&gt; device-tracking attach-policy IP_Dev&lt;BR /&gt; no logging event link-status&lt;BR /&gt; load-interval aa&lt;BR /&gt; authentication control-direction in&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication event server dead action authorize&lt;BR /&gt; authentication event server dead action authorize voice&lt;BR /&gt; authentication event server alive action reinitialize&lt;BR /&gt; authentication host-mode multi-domain&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab&lt;BR /&gt; authentication priority dot1x mab&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; authentication violation restrict&lt;BR /&gt; mab&lt;BR /&gt; no snmp trap link-status&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 5&lt;BR /&gt; storm-control broadcast level&amp;nbsp;&lt;BR /&gt; storm-control multicast level&amp;nbsp;&lt;BR /&gt; storm-control action trap&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the switch, i can see the following logs,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1: Nov&amp;nbsp;11 14:06:55.769 EST: %AUTHMGR-5-SECURITY_VIOLATION: Security violation on the interface GigabitEthernet x/x, new MAC address (0015.5d) is seen.AuditSessionID 5Atx&lt;BR /&gt;&amp;nbsp;EST: %AUTHMGR-5-SECURITY_VIOLATION: Security violation on the interface GigabitEthernet x/x, new MAC address (0015.5d) is seen.AuditSessionID 5Atx&lt;BR /&gt;: %AUTHMGR-5-SECURITY_VIOLATION: Security violation on the interface GigabitEthernet x/x, new MAC address (0015.5d) is seen.AuditSessionID 5Atx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is hitted to unknown MAB authentication policy.&lt;/P&gt;
&lt;P&gt;This is happens only for the Dynamic MAC device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your advice please.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2018 03:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3750410#M487965</guid>
      <dc:creator>jm.virtual01</dc:creator>
      <dc:date>2018-11-21T03:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3750470#M487966</link>
      <description>&lt;P&gt;If the mac addres is unknown this is normal behaviour. What radius live logs you see ,we cant help if you not share more information&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2018 05:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3750470#M487966</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-11-21T05:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752743#M487967</link>
      <description>&lt;P&gt;What the information that you need to&amp;nbsp;investigate&amp;nbsp;this issue in depth?&lt;/P&gt;
&lt;P&gt;I have shared you the port config and logs from Switch and ISE end.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 13:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752743#M487967</guid>
      <dc:creator>jm.virtual01</dc:creator>
      <dc:date>2018-11-26T13:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752754#M487968</link>
      <description>&lt;P&gt;We need to see radius live logs from ISE&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 13:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752754#M487968</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-11-26T13:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752790#M487969</link>
      <description>&lt;P&gt;Here are the live radius logs for some devices. And when i go to the details for the authentication from the live log page, it shows me some steps&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR class=""&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11017&lt;/TD&gt;
&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11027&lt;/TD&gt;
&lt;TD&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15049&lt;/TD&gt;
&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15008&lt;/TD&gt;
&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - DEVICE.Stage&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15004&lt;/TD&gt;
&lt;TD&gt;Matched rule - MAB&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15041&lt;/TD&gt;
&lt;TD&gt;Evaluating Identity Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15006&lt;/TD&gt;
&lt;TD&gt;Matched Default Rule&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15013&lt;/TD&gt;
&lt;TD&gt;Selected Identity Source - Internal Endpoints&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24209&lt;/TD&gt;
&lt;TD&gt;Looking up Endpoint in Internal Endpoints IDStore -&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24211&lt;/TD&gt;
&lt;TD&gt;Found Endpoint in Internal Endpoints IDStore&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;22037&lt;/TD&gt;
&lt;TD&gt;Authentication Passed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15036&lt;/TD&gt;
&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - EndPoints.LogicalProfile&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24432&lt;/TD&gt;
&lt;TD&gt;Looking up user in Active Directory - acct.XXXX.net&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24325&lt;/TD&gt;
&lt;TD&gt;Resolving identity -&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24313&lt;/TD&gt;
&lt;TD&gt;Search for matching accounts at join point - XXXX.net&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24318&lt;/TD&gt;
&lt;TD&gt;No matching account found in forest - XXXX.net&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24367&lt;/TD&gt;
&lt;TD&gt;Skipping unusable domain - YYYY.net,Domain trust is one-way&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24367&lt;/TD&gt;
&lt;TD&gt;Skipping unusable domain - mgmt.XXXX.net,Domain trust is one-way&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24322&lt;/TD&gt;
&lt;TD&gt;Identity resolution detected no matching account&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24352&lt;/TD&gt;
&lt;TD&gt;Identity resolution failed - ERROR_NO_SUCH_USER&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24412&lt;/TD&gt;
&lt;TD&gt;User not found in Active Directory - acct.XXXX.net&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - acct.XXXX.net.ExternalGroups&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15004&lt;/TD&gt;
&lt;TD&gt;Matched rule -&amp;nbsp;XXXX Printers&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15016&lt;/TD&gt;
&lt;TD&gt;Selected Authorization Profile - PermitAccess,Printer,AuthZ_Reauth_timer_12hrs&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15016&lt;/TD&gt;
&lt;TD&gt;Selected Authorization Profile - PermitAccess,Printer,AuthZ_Reauth_timer_12hrs&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15016&lt;/TD&gt;
&lt;TD&gt;Selected Authorization Profile - PermitAccess,Printer,AuthZ_Reauth_timer_12hrs&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11002&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Accept&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="2470"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="64"&gt;Time&lt;/TD&gt;
&lt;TD width="64"&gt;Status&lt;/TD&gt;
&lt;TD width="89"&gt;Repeat Count&lt;/TD&gt;
&lt;TD width="151"&gt;Identity&lt;/TD&gt;
&lt;TD width="192"&gt;Endpoint ID&lt;/TD&gt;
&lt;TD width="201"&gt;Endpoint Profile&lt;/TD&gt;
&lt;TD width="415"&gt;Authentication Policy&lt;/TD&gt;
&lt;TD width="415"&gt;Authorization Policy&lt;/TD&gt;
&lt;TD width="374"&gt;Authorization Profiles&lt;/TD&gt;
&lt;TD width="254"&gt;IP Address&lt;/TD&gt;
&lt;TD width="64"&gt;Network Device&lt;/TD&gt;
&lt;TD width="64"&gt;Device Port&lt;/TD&gt;
&lt;TD width="123"&gt;Identity Group&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;17:32.0&lt;/TD&gt;
&lt;TD&gt;Session&lt;/TD&gt;
&lt;TD&gt;2200&lt;/TD&gt;
&lt;TD&gt;00:0F:E7:07:4B:EB&lt;/TD&gt;
&lt;TD&gt;00:0F:E7:07:4B:EB&lt;/TD&gt;
&lt;TD&gt;XXXX_Lutron_Electronics&lt;/TD&gt;
&lt;TD&gt;XXXX Wired NAC Policy - Monitor &amp;gt;&amp;gt; MAB &amp;gt;&amp;gt; Default&lt;/TD&gt;
&lt;TD&gt;XXXX Wired NAC Policy - Monitor &amp;gt;&amp;gt; XXXX Environmental Device&lt;/TD&gt;
&lt;TD colspan="2"&gt;PermitAccess,XXXX_Environmental,AuthZ_Reauth_timer_12hrs&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="2"&gt;GigabitEthernet0/14&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;17:31.7&lt;/TD&gt;
&lt;TD&gt;Session&lt;/TD&gt;
&lt;TD&gt;2113&lt;/TD&gt;
&lt;TD&gt;C8:CB:B8:0D:9A:F4&lt;/TD&gt;
&lt;TD&gt;C8:CB:B8:0D:9A:F4&lt;/TD&gt;
&lt;TD&gt;Windows7-Workstation&lt;/TD&gt;
&lt;TD&gt;XXXX Wired NAC Policy - Monitor &amp;gt;&amp;gt; MAB &amp;gt;&amp;gt; Default&lt;/TD&gt;
&lt;TD&gt;XXXX Wired NAC Policy - Monitor &amp;gt;&amp;gt; XXXX F5 CMDB Prod&lt;/TD&gt;
&lt;TD&gt;PermitAccess,AuthZ_Reauth_timer_18hrs&lt;/TD&gt;
&lt;TD&gt;20.30.155.221,0xffd5150958&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="2"&gt;GigabitEthernet/2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;17:31.4&lt;/TD&gt;
&lt;TD&gt;Session&lt;/TD&gt;
&lt;TD&gt;1705&lt;/TD&gt;
&lt;TD&gt;00:1E:CA:FE:CE:60&lt;/TD&gt;
&lt;TD&gt;00:1E:CA:FE:CE:60&lt;/TD&gt;
&lt;TD&gt;Nortel-Device&lt;/TD&gt;
&lt;TD&gt;XXXX Wired NAC Policy - Monitor &amp;gt;&amp;gt; MAB &amp;gt;&amp;gt; Default&lt;/TD&gt;
&lt;TD&gt;XXXX Wired NAC Policy - Monitor &amp;gt;&amp;gt; XXXX Voice Hardware&lt;/TD&gt;
&lt;TD&gt;PermitAccess,XXXX_Voice_Hardware,AuthZ_Reauth_timer_12hrs&lt;/TD&gt;
&lt;TD&gt;20.254.118.43&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="2"&gt;GigabitEthernet0/29&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 26 Nov 2018 14:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3752790#M487969</guid>
      <dc:creator>jm.virtual01</dc:creator>
      <dc:date>2018-11-26T14:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753255#M487970</link>
      <description>&lt;P style="text-align: justify;"&gt;Hi , as i see you use multi domain this will allow only 1 mac address on data vlan and 1 mac address on voice vlan . If you dont have global config authentication mac move permit it will always fail. You can try port config with authentication host multi auth.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 05:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753255#M487970</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-11-27T05:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753499#M487971</link>
      <description>&lt;P&gt;Many switches don't pass 802.1x frames correctly, have you verified you have a switch/hub that does?&amp;nbsp; I am not talking about the switch you are running authentication on, I am referring to the switch/hub you have hanging off that switch where these devices are plugged into.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 12:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753499#M487971</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-11-27T12:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753518#M487972</link>
      <description>&lt;P&gt;I never checked how can i check that&amp;nbsp; thing? On some location there is some specific devices are connected int he network such as HVAC devices for Heat and Vacuum and these devices are connected through the some Intel device. Also there is some other specific devices such as Lab Devices and Monitor Devices.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 13:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753518#M487972</guid>
      <dc:creator>jm.virtual01</dc:creator>
      <dc:date>2018-11-27T13:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753521#M487973</link>
      <description>If you take the same 802.1x device that is failing when connected to the hub/switch and plug it directly into the Cisco switch running authentication and it works then most likely the issue is with the hub/switch no passing 802.1x frames correctly.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Nov 2018 13:29:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753521#M487973</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-11-27T13:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753847#M487974</link>
      <description>&lt;P&gt;If you have a hub connected and there are multiple devices connected behind it , "authentication host-mode multi-auth" does not really the case. You will have to use "authentication host-mode multi-auth". What this does it, it authenticates every device that is connected behind the port. I mean every mac address that is connected behind the port including the hub.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you configuration is more like below, the performance of the authentication process increases and you would not see those security violations as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface gi yy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport access vlan xxx&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport mode access&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport voice vlan yyy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;device-tracking attach-policy IP_Dev&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no logging event link-status&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;load-interval aa&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication control-direction in&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication event fail action next-method&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication event server dead action authorize&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication event server dead action authorize voice&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication event server alive action reinitialize&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;authentication host-mode multi-auth&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication open&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;authentication order&amp;nbsp; mab dot1x&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication priority dot1x mab&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication port-control auto&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication periodic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication timer reauthenticate server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication violation restrict&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mab&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no snmp trap link-status&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dot1x pae authenticator&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dot1x timeout tx-period 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;storm-control broadcast level&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;storm-control multicast level&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;storm-control action trap&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;spanning-tree portfast&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;spanning-tree bpduguard enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;end&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For more information on what these modes are and what they mean, here is the document that might help you :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-9-0E/15-25E/configuration/guide/xe-390-configuration/dot1x.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-9-0E/15-25E/configuration/guide/xe-390-configuration/dot1x.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 20:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3753847#M487974</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-11-27T20:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authorization issue</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3754573#M487975</link>
      <description>&lt;P&gt;Yes, may be multi auth solve the issue. But have one question about the authentication order.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;authentication order&amp;nbsp; mab dot1x&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I believe, we should keep the authentication order as per the priority. I am not sure, can you share your ideas on it?&lt;/P&gt;
&lt;P&gt;Why i need to keep the authentication order as you mentioned in your reply? I am very interested about it so can you educate me on this.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 18:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-issue/m-p/3754573#M487975</guid>
      <dc:creator>jm.virtual01</dc:creator>
      <dc:date>2018-11-28T18:17:14Z</dc:date>
    </item>
  </channel>
</rss>

